/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | sha1-pbkdf2.c | 18 unsigned char tmp[SHA1_MAC_LEN], tmp2[SHA1_MAC_LEN]; in pbkdf2_sha1_f() 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f() 47 SHA1_MAC_LEN, tmp2)) in pbkdf2_sha1_f() 49 os_memcpy(tmp, tmp2, SHA1_MAC_LEN); in pbkdf2_sha1_f() 50 for (j = 0; j < SHA1_MAC_LEN; j++) in pbkdf2_sha1_f() 78 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; in pbkdf2_sha1()
|
H A D | sha1-tlsprf.c | 35 u8 A_MD5[MD5_MAC_LEN], A_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 36 u8 P_MD5[MD5_MAC_LEN], P_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 51 SHA1_len[0] = SHA1_MAC_LEN; in tls_prf_sha1_md5() 75 SHA1_pos = SHA1_MAC_LEN; in tls_prf_sha1_md5() 82 if (SHA1_pos == SHA1_MAC_LEN) { in tls_prf_sha1_md5() 86 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); in tls_prf_sha1_md5() 97 forced_memzero(A_SHA1, SHA1_MAC_LEN); in tls_prf_sha1_md5() 98 forced_memzero(P_SHA1, SHA1_MAC_LEN); in tls_prf_sha1_md5()
|
H A D | sha1-tprf.c | 34 u8 hash[SHA1_MAC_LEN]; in sha1_t_prf() 59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf() 60 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in sha1_t_prf() 61 pos += SHA1_MAC_LEN; in sha1_t_prf() 66 len[0] = SHA1_MAC_LEN; in sha1_t_prf() 69 forced_memzero(hash, SHA1_MAC_LEN); in sha1_t_prf()
|
H A D | sha1-prf.c | 35 u8 hash[SHA1_MAC_LEN]; in sha1_prf() 50 if (plen >= SHA1_MAC_LEN) { in sha1_prf() 54 pos += SHA1_MAC_LEN; in sha1_prf()
|
H A D | ms_funcs.c | 84 u8 hash[SHA1_MAC_LEN]; in challenge_hash() 251 const size_t len2[3] = { SHA1_MAC_LEN, 8, sizeof(magic2) }; in generate_authenticator_response_pwhash() 335 u8 hash[SHA1_MAC_LEN]; in get_master_key() 396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() 412 if (session_key_len > SHA1_MAC_LEN) in get_asymetric_start_key() 413 session_key_len = SHA1_MAC_LEN; in get_asymetric_start_key()
|
H A D | sha1.h | 12 #define SHA1_MAC_LEN 20 macro
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha1-pbkdf2.c | 18 unsigned char tmp[SHA1_MAC_LEN], tmp2[SHA1_MAC_LEN]; in pbkdf2_sha1_f() 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f() 47 SHA1_MAC_LEN, tmp2)) in pbkdf2_sha1_f() 49 os_memcpy(tmp, tmp2, SHA1_MAC_LEN); in pbkdf2_sha1_f() 50 for (j = 0; j < SHA1_MAC_LEN; j++) in pbkdf2_sha1_f() 78 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; in pbkdf2_sha1()
|
H A D | sha1-tlsprf.c | 35 u8 A_MD5[MD5_MAC_LEN], A_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 36 u8 P_MD5[MD5_MAC_LEN], P_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 51 SHA1_len[0] = SHA1_MAC_LEN; in tls_prf_sha1_md5() 75 SHA1_pos = SHA1_MAC_LEN; in tls_prf_sha1_md5() 82 if (SHA1_pos == SHA1_MAC_LEN) { in tls_prf_sha1_md5() 86 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); in tls_prf_sha1_md5() 97 forced_memzero(A_SHA1, SHA1_MAC_LEN); in tls_prf_sha1_md5() 98 forced_memzero(P_SHA1, SHA1_MAC_LEN); in tls_prf_sha1_md5()
|
H A D | sha1-tprf.c | 34 u8 hash[SHA1_MAC_LEN]; in sha1_t_prf() 59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf() 60 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in sha1_t_prf() 61 pos += SHA1_MAC_LEN; in sha1_t_prf() 66 len[0] = SHA1_MAC_LEN; in sha1_t_prf() 69 forced_memzero(hash, SHA1_MAC_LEN); in sha1_t_prf()
|
H A D | sha1-prf.c | 35 u8 hash[SHA1_MAC_LEN]; in sha1_prf() 50 if (plen >= SHA1_MAC_LEN) { in sha1_prf() 54 pos += SHA1_MAC_LEN; in sha1_prf()
|
H A D | ms_funcs.c | 84 u8 hash[SHA1_MAC_LEN]; in challenge_hash() 251 const size_t len2[3] = { SHA1_MAC_LEN, 8, sizeof(magic2) }; in generate_authenticator_response_pwhash() 335 u8 hash[SHA1_MAC_LEN]; in get_master_key() 396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() 412 if (session_key_len > SHA1_MAC_LEN) in get_asymetric_start_key() 413 session_key_len = SHA1_MAC_LEN; in get_asymetric_start_key()
|
H A D | sha1.h | 12 #define SHA1_MAC_LEN 20 macro
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_peap_common.c | 21 u8 hash[SHA1_MAC_LEN]; in peap_prfplus() 74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus() 75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in peap_prfplus() 76 pos += SHA1_MAC_LEN; in peap_prfplus() 81 len[0] = SHA1_MAC_LEN; in peap_prfplus()
|
H A D | eap_eke_common.c | 96 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_len() 111 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_ps_len() 150 return SHA1_MAC_LEN; in eap_eke_auth_len() 211 u8 hash[SHA1_MAC_LEN]; in eap_eke_prf_hmac_sha1() 219 vlen[0] = SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 235 if (len > SHA1_MAC_LEN) { in eap_eke_prf_hmac_sha1() 236 os_memcpy(res, hash, SHA1_MAC_LEN); in eap_eke_prf_hmac_sha1() 237 res += SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 238 len -= SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 576 return hmac_sha1(key, SHA1_MAC_LEN, dat in eap_eke_mac() [all...] |
H A D | eap_pax_common.c | 35 u8 mac[SHA1_MAC_LEN]; in eap_pax_kdf() 93 u8 hash[SHA1_MAC_LEN]; in eap_pax_mac()
|
H A D | eap_sake_common.c | 216 u8 hash[SHA1_MAC_LEN]; in eap_sake_kdf() 233 if (plen >= SHA1_MAC_LEN) { in eap_sake_kdf() 237 pos += SHA1_MAC_LEN; in eap_sake_kdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_peap_common.c | 21 u8 hash[SHA1_MAC_LEN]; in peap_prfplus() 74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus() 75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in peap_prfplus() 76 pos += SHA1_MAC_LEN; in peap_prfplus() 81 len[0] = SHA1_MAC_LEN; in peap_prfplus()
|
H A D | eap_eke_common.c | 96 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_len() 111 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_ps_len() 150 return SHA1_MAC_LEN; in eap_eke_auth_len() 211 u8 hash[SHA1_MAC_LEN]; in eap_eke_prf_hmac_sha1() 219 vlen[0] = SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 235 if (len > SHA1_MAC_LEN) { in eap_eke_prf_hmac_sha1() 236 os_memcpy(res, hash, SHA1_MAC_LEN); in eap_eke_prf_hmac_sha1() 237 res += SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 238 len -= SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 576 return hmac_sha1(key, SHA1_MAC_LEN, dat in eap_eke_mac() [all...] |
H A D | eap_pax_common.c | 35 u8 mac[SHA1_MAC_LEN]; in eap_pax_kdf() 93 u8 hash[SHA1_MAC_LEN]; in eap_pax_mac()
|
H A D | eap_sake_common.c | 216 u8 hash[SHA1_MAC_LEN]; in eap_sake_kdf() 233 if (plen >= SHA1_MAC_LEN) { in eap_sake_kdf() 237 pos += SHA1_MAC_LEN; in eap_sake_kdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/l2_packet/ |
H A D | l2_packet_linux.c | 39 u8 last_hash[SHA1_MAC_LEN]; 40 u8 last_hash_prev[SHA1_MAC_LEN]; 182 u8 hash[SHA1_MAC_LEN]; in l2_packet_receive() 204 os_memcmp(hash, l2->last_hash, SHA1_MAC_LEN) == 0) { in l2_packet_receive() 210 os_memcmp(hash, l2->last_hash_prev, SHA1_MAC_LEN) == 0) { in l2_packet_receive() 215 os_memcpy(l2->last_hash_prev, l2->last_hash, SHA1_MAC_LEN); in l2_packet_receive() 217 os_memcpy(l2->last_hash, hash, SHA1_MAC_LEN); in l2_packet_receive() 234 u8 hash[SHA1_MAC_LEN]; in l2_packet_receive_br() 261 os_memcmp(hash, l2->last_hash, SHA1_MAC_LEN) == 0) { in l2_packet_receive_br() 266 os_memcmp(hash, l2->last_hash_prev, SHA1_MAC_LEN) in l2_packet_receive_br() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/l2_packet/ |
H A D | l2_packet_linux.c | 42 u8 last_hash[SHA1_MAC_LEN]; 43 u8 last_hash_prev[SHA1_MAC_LEN]; 238 u8 hash[SHA1_MAC_LEN]; in l2_packet_receive() 263 os_memcmp(hash, l2->last_hash, SHA1_MAC_LEN) == 0) { in l2_packet_receive() 269 os_memcmp(hash, l2->last_hash_prev, SHA1_MAC_LEN) == 0) { in l2_packet_receive() 274 os_memcpy(l2->last_hash_prev, l2->last_hash, SHA1_MAC_LEN); in l2_packet_receive() 276 os_memcpy(l2->last_hash, hash, SHA1_MAC_LEN); in l2_packet_receive() 296 u8 hash[SHA1_MAC_LEN]; in l2_packet_receive_br() 323 os_memcmp(hash, l2->last_hash, SHA1_MAC_LEN) == 0) { in l2_packet_receive_br() 328 os_memcmp(hash, l2->last_hash_prev, SHA1_MAC_LEN) in l2_packet_receive_br() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_ocsp.c | 54 u8 hash[SHA1_MAC_LEN]; in ocsp_responder_id_match() 60 return os_memcmp(hash, key_hash, SHA1_MAC_LEN) == 0; in ocsp_responder_id_match() 552 if (hdr.length != SHA1_MAC_LEN) { in tls_process_basic_ocsp_response() 555 hdr.length, SHA1_MAC_LEN); in tls_process_basic_ocsp_response()
|
H A D | tlsv1_server_read.c | 891 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos; in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1101 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_process_client_finished() 1218 hlen = SHA1_MAC_LEN; in tls_process_client_finished() 1228 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_process_client_finished()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_ocsp.c | 54 u8 hash[SHA1_MAC_LEN]; in ocsp_responder_id_match() 60 return os_memcmp(hash, key_hash, SHA1_MAC_LEN) == 0; in ocsp_responder_id_match() 524 if (hdr.length != SHA1_MAC_LEN) { in tls_process_basic_ocsp_response() 527 hdr.length, SHA1_MAC_LEN); in tls_process_basic_ocsp_response()
|